modulexcite
Just Code It! SSBMb3ZlIEh1bnRpbmcvRmluZGluZyB0aGluZ3MgYW5kIHdvdWxkbid0IGJlIHBvc3NpYmxlIHdpdGhvdXQgdGhlIGhlbHAgZnJvbSBhbGwgdGhlIGFtYXppbmcgT1NTIGNvbnRyaWJ1dG9y
Pinned Repositories
age
A simple, modern and secure encryption tool (and Go library) with small explicit keys, no config options, and UNIX-style composability.
AMSI.fail
C# Azure Function with an HTTP trigger that generates obfuscated PowerShell snippets that break or disable AMSI for the current process.
AMSITrigger
The Hunt for Malicious Strings
AsyncFixer
attacking-and-auditing-docker-containers-and-kubernetes-clusters
Appsecco training course content on Attacking and Auditing Dockers Containers and Kubernetes Clusters
BeaconEye
Hunts out CobaltStrike beacons and logs operator command output
building-secure-contracts
Guidelines and training material to write secure smart contracts
SysTracingPoc
CVE-2020-0668 - Microsoft Windows Service Tracing Arbitrary File Move Local Privilege Escalation Vulnerability
modulexcite's Repositories
modulexcite/age
A simple, modern and secure encryption tool (and Go library) with small explicit keys, no config options, and UNIX-style composability.
modulexcite/building-secure-contracts
Guidelines and training material to write secure smart contracts
modulexcite/capa
The FLARE team's open-source tool to identify capabilities in executable files.
modulexcite/cyberchef-recipes
A list of cyber-chef recipes and curated links
modulexcite/echidna
Ethereum smart contract fuzzer
modulexcite/etl2pcapng
Utility that converts an .etl file containing a Windows network packet capture into .pcapng format.
modulexcite/every-programmer-should-know
A collection of (mostly) technical things every software developer should know about
modulexcite/feroxbuster
A fast, simple, recursive content discovery tool written in Rust.
modulexcite/fibratus
A modern tool for the Windows kernel exploration and tracing
modulexcite/frogy
My subdomain enumeration script. It's unique in the way it is built upon.
modulexcite/gau
Fetch known URLs from AlienVault's Open Threat Exchange, the Wayback Machine, and Common Crawl.
modulexcite/hacktricks
Welcome to the page where you will find each trick/technique/whatever I have learnt in CTFs, real life apps, and reading researches and news.
modulexcite/howtheysre
A curated collection of publicly available resources on how technology and tech-savvy organizations around the world practice Site Reliability Engineering (SRE)
modulexcite/InstallerFileTakeOver
modulexcite/js-unit-testing-guide
📙 A guide to unit testing in Javascript
modulexcite/nginxconfig.io
⚙️ NGINX config generator on steroids 💉
modulexcite/nuclei-templates
Community curated list of templates for the nuclei engine to find security vulnerabilities.
modulexcite/osv
Open source vulnerability DB and triage service.
modulexcite/postmortem-templates
A collection of postmortem templates
modulexcite/public-bugbounty-programs
Community curated list of public bug bounty and responsible disclosure programs.
modulexcite/SharpSocks
Tunnellable HTTP/HTTPS socks4a proxy written in C# and deployable via PowerShell
modulexcite/slither
Static Analyzer for Solidity
modulexcite/Sourcetrail
Sourcetrail - free and open-source interactive source explorer
modulexcite/ssh-mitm-1
ssh mitm server for security audits supporting public key authentication, session hijacking and file manipulation
modulexcite/streamalert
StreamAlert is a serverless, realtime data analysis framework which empowers you to ingest, analyze, and alert on data from any environment, using datasources and alerting logic you define.
modulexcite/system-design-interview
System design interview for IT companies
modulexcite/WADComs.github.io
WADComs is an interactive cheat sheet, containing a curated list of offensive security tools and their respective commands, to be used against Windows/AD environments.
modulexcite/Web-Attack-Cheat-Sheet
Web Attack Cheat Sheet
modulexcite/WebJobs
modulexcite/wtf
wtf is a distributed, code-coverage guided, customizable, cross-platform snapshot-based fuzzer designed for attacking user and / or kernel-mode targets running on Microsoft Windows.